http-sniffer Logo

http-sniffer

0
Free
Visit Website

A multi-threading tool to sniff HTTP header records beyond TCP flow statistics, supporting both offline PCAP file and live NIC sniffing. It exports statistics of TCP flows, HTTP request/response pairs, and supports JSON format output. Dependencies include libpcap for traffic packet extraction, json-c for JSON parsing, and scons for project building. To use, run 'scons' in the root folder to compile, then specify the live interface with 'ifconfig' in the terminal (e.g., en0) or store output flows as JSON. Output includes brief CSV format.

FEATURES

ALTERNATIVES

A set of Go-based emulators for testing network security and analyzing network traffic.

A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.

replayproxy allows you to 're-live' a HTTP session captured in a .pcap file, parsing HTTP streams, caching them, and starting a HTTP proxy to reply to requests with matching responses.

A utility for splitting packet traces along TCP connection boundaries.

Firewall, Blackhole, and Privatizing Proxy for macOS with comprehensive security features.

Akamai Guardicore Segmentation is a microsegmentation tool that provides network visibility, policy creation, and enforcement to prevent lateral movement and protect critical assets in diverse IT environments.

A subdomain scan tool that helps you find subdomains of a given domain.

NFStream is a multiplatform Python framework for network flow data analysis with a focus on speed and flexibility.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved